Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linuxfoundation iot-yocto 22.2 vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2023-20740
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559840.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
6.7
CVSSv3
CVE-2023-20733
In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20734
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20735
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.4
CVSSv3
CVE-2023-20736
In vcu, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645189.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20737
In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645167.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20738
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20743
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519142.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20744
In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-20745
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »